Skip to main content

Showing 1–39 of 39 results for author: Foster, S

Searching in archive cs. Search in all archives.
.
  1. ACCESS: Assurance Case Centric Engineering of Safety-critical Systems

    Authors: Ran Wei, Simon Foster, Haitao Mei, Fang Yan, Ruizhe Yang, Ibrahim Habli, Colin O'Halloran, Nick Tudor, Tim Kelly, Yakoub Nemouchi

    Abstract: Assurance cases are used to communicate and assess confidence in critical system properties such as safety and security. Historically, assurance cases have been manually created documents, which are evaluated by system stakeholders through lengthy and complicated processes. In recent years, model-based system assurance approaches have gained popularity to improve the efficiency and quality of syst… ▽ More

    Submitted 16 April, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

  2. arXiv:2401.12061  [pdf, other

    cs.LO cs.MS

    Scalable Automated Verification for Cyber-Physical Systems in Isabelle/HOL

    Authors: Jonathan Julián Huerta y Munive, Simon Foster, Mario Gleirscher, Georg Struth, Christian Pardillo Laursen, Thomas Hickman

    Abstract: We formally introduce IsaVODEs (Isabelle verification with Ordinary Differential Equations), a framework for the verification of cyber-physical systems. We describe the semantic foundations of the framework's formalisation in the Isabelle/HOL proof assistant. A user-friendly language specification based on a robust state model makes our framework flexible and adaptable to various engineering workf… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: Submitted to the Journal of Automated Reasoning

  3. arXiv:2310.10658  [pdf

    cs.CR

    Checking and Automating Confidentiality Theory in Isabelle/UTP

    Authors: Lex Bailey, Jim Woodcock, Simon Foster, Roberto Metere

    Abstract: The severity of recent vulnerabilities discovered on modern CPUs, e.g., Spectre [1], highlights how information leakage can have devas-tating effects to the security of computer systems. At the same time, it suggests that confidentiality should be promoted as a normal part of program verification, to discover and mitigate such vulnerabili-ties early in development. The theory we propose is primari… ▽ More

    Submitted 7 September, 2023; originally announced October 2023.

  4. arXiv:2303.09692  [pdf, other

    cs.LO cs.LG cs.PL

    Probabilistic relations for modelling epistemic and aleatoric uncertainty: semantics and automated reasoning with theorem proving

    Authors: Kangfeng Ye, Jim Woodcock, Simon Foster

    Abstract: Probabilistic programming combines general computer programming, statistical inference, and formal semantics to help systems make decisions when facing uncertainty. Probabilistic programs are ubiquitous, including having a significant impact on machine intelligence. While many probabilistic algorithms have been used in practice in different domains, their automated verification based on formal sem… ▽ More

    Submitted 15 June, 2023; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: 48 pages and 5 figures, submitted to the journal of Theoretical Computer Science

  5. Formally Verified Animation for RoboChart using Interaction Trees

    Authors: Kangfeng Ye, Simon Foster, Jim Woodcock

    Abstract: RoboChart is a core notation in the RoboStar framework. It is a timed and probabilistic domain-specific and state machine-based language for robotics. RoboChart supports shared variables and communication across entities in its component model. It has formal denotational semantics given in CSP. The semantic technique of Interaction Trees (ITrees) represents behaviours of reactive and concurrent pr… ▽ More

    Submitted 13 September, 2023; v1 submitted 16 March, 2023; originally announced March 2023.

    Comments: The journal extension version of the ICFEM2022 paper (https://doi.org/10.1007/978-3-031-17244-1_24). 44 pages and submitted to the Journal of Logical and Algebraic Methods in Programming (JLAMP) This is the first revision

    Journal ref: Journal of Logical and Algebraic Methods in Programming, Volume 137, February 2024, 100940

  6. Absynthe: Abstract Interpretation-Guided Synthesis

    Authors: Sankha Narayan Guria, Jeffrey S. Foster, David Van Horn

    Abstract: Synthesis tools have seen significant success in recent times. However, past approaches often require a complete and accurate embedding of the source language in the logic of the underlying solver, an approach difficult for industrial-grade languages. Other approaches couple the semantics of the source language with purpose-built synthesizers, necessarily tying the synthesis engine to a particular… ▽ More

    Submitted 24 April, 2023; v1 submitted 25 February, 2023; originally announced February 2023.

    Comments: 22 pages, 6 figures, this is a preprint of a paper conditionally accepted at Programming Language Design and Implementation (PLDI) 2023

  7. arXiv:2302.07629  [pdf, other

    cs.LO

    Automated Reasoning for Physical Quantities, Units, and Measurements in Isabelle/HOL

    Authors: Simon Foster, Burkhart Wolff

    Abstract: Formal verification of cyber-physical and robotic systems requires that we can accurately model physical quantities that exist in the real-world. The use of explicit units in such quantities can allow a higher degree of rigour, since we can ensure compatibility of quantities in calculations. At the same time, improper use of units can be a barrier to safety and therefore it is highly desirable to… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: 10 pages, submitted to ICECCS 2023

  8. arXiv:2210.08963  [pdf

    cs.CY math.OC

    A Framework for Operations Research Model Use in Resilience to Fundamental Surprise Events: Observations from University Operations during COVID-19

    Authors: Thomas C. Sharkey, Steven Foster, Sudeep Hegde, Mary E. Kurz, Emily L. Tucker

    Abstract: Operations research (OR) approaches have been increasingly applied to model the resilience of a system to surprise events. In order to model a surprise event, one must have an understanding of its characteristics, which then become parameters, decisions, and/or constraints in the resulting model. This means that these models cannot (directly) handle fundamental surprise events, which are events th… ▽ More

    Submitted 20 September, 2022; originally announced October 2022.

  9. arXiv:2206.01695  [pdf, ps, other

    cs.NE

    Optimal Design of Electric Machine with Efficient Handling of Constraints and Surrogate Assistance

    Authors: Bhuvan Khoshoo, Julian Blank, Thang Q. Pham, Kalyanmoy Deb, Shanelle N. Foster

    Abstract: Electric machine design optimization is a computationally expensive multi-objective optimization problem. While the objectives require time-consuming finite element analysis, optimization constraints can often be based on mathematical expressions, such as geometric constraints. This article investigates this optimization problem of mixed computationally expensive nature by proposing an optimizatio… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  10. arXiv:2106.05987  [pdf, other

    cs.LO

    Hybrid Systems Verification with Isabelle/HOL: Simpler Syntax, Better Models, Faster Proofs

    Authors: Simon Foster, Jonathan Julián Huerta y Munive, Mario Gleirscher, Georg Struth

    Abstract: We extend a semantic verification framework for hybrid systems with the Isabelle/HOL proof assistant by an algebraic model for hybrid program stores, a shallow expression model for hybrid programs and their correctness specifications, and domain-specific deductive and calculational support. The new store model yields clean separations and dynamic local views of variables, e.g. discrete/continuous,… ▽ More

    Submitted 10 June, 2021; originally announced June 2021.

    Comments: 18 pages, submitted to FM 2021

  11. arXiv:2105.05133  [pdf, other

    cs.LO

    Formally Verified Simulations of State-Rich Processes using Interaction Trees in Isabelle/HOL

    Authors: Simon Foster, Chung-Kil Hur, Jim Woodcock

    Abstract: Simulation and formal verification are important complementary techniques necessary in high assurance model-based systems development. In order to support coherent results, it is necessary to provide unifying semantics and automation for both activities. In this paper we apply Interaction Trees in Isabelle/HOL to produce a verification and simulation framework for state-rich process languages. We… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Comments: 14 pages, submitted to CONCUR 2021

  12. arXiv:2102.13183  [pdf, other

    cs.PL

    RbSyn: Type- and Effect-Guided Program Synthesis

    Authors: Sankha Narayan Guria, Jeffrey S. Foster, David Van Horn

    Abstract: In recent years, researchers have explored component-based synthesis, which aims to automatically construct programs that operate by composing calls to existing APIs. However, prior work has not considered efficient synthesis of methods with side effects, e.g., web app methods that update a database. In this paper, we introduce RbSyn, a novel type- and effect-guided synthesis tool for Ruby. An RbS… ▽ More

    Submitted 7 April, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

    Comments: 17 pages, 13 figures, this is a technical report (with appendix) of a paper to appear in Programming Language Design and Implementation (PLDI) 2021

  13. arXiv:2102.02679  [pdf, other

    cs.LO math.DS

    Certifying Differential Equation Solutions from Computer Algebra Systems in Isabelle/HOL

    Authors: Thomas Hickman, Christian Pardillo Laursen, Simon Foster

    Abstract: The Isabelle/HOL proof assistant has a powerful library for continuous analysis, which provides the foundation for verification of hybrid systems. However, Isabelle lacks automated proof support for continuous artifacts, which means that verification is often manual. In contrast, Computer Algebra Systems (CAS), such as Mathematica and SageMath, contain a wealth of efficient algorithms for matrices… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

    Comments: 15 pages, under consideration for NFM 2021

  14. Integration of Formal Proof into Unified Assurance Cases with Isabelle/SACM

    Authors: Simon Foster, Yakoub Nemouchi, Mario Gleirscher, Ran Wei, Tim Kelly

    Abstract: Assurance cases are often required to certify critical systems. The use of formal methods in assurance can improve automation, increase confidence, and overcome errant reasoning. However, assurance cases can never be fully formalised, as the use of formal methods is contingent on models that are validated by informal processes. Consequently, assurance techniques should support both formal and info… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

    Comments: 28 pages, in revision for Formal Aspects of Computing

  15. Automated Verification of Reactive and Concurrent Programs by Calculation

    Authors: Simon Foster, Kangfeng Ye, Ana Cavalcanti, Jim Woodcock

    Abstract: Reactive programs combine traditional sequential programming constructs with primitives to allow communication with other concurrent agents. They are ubiquitous in modern applications, ranging from components systems and web services, to cyber-physical systems and autonomous robots. In this paper, we present an algebraic verification strategy for concurrent reactive programs, with a large or infin… ▽ More

    Submitted 12 April, 2021; v1 submitted 27 July, 2020; originally announced July 2020.

    Comments: 39 pages, accepted for publication in Journal of Logic and Algebraic Methods in Programming (JLAMP), submitted 30/04/2019

  16. Towards Deductive Verification of Control Algorithms for Autonomous Marine Vehicles

    Authors: Simon Foster, Mario Gleirscher, Radu Calinescu

    Abstract: The use of autonomous vehicles in real-world applications is often precluded by the difficulty of providing safety guarantees for their complex controllers. The simulation-based testing of these controllers cannot deliver sufficient safety guarantees, and the use of formal verification is very challenging due to the hybrid nature of the autonomous vehicles. Our work-in-progress paper introduces a… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  17. arXiv:1912.00317  [pdf, other

    cs.CR cs.HC

    An Observational Investigation of Reverse Engineers' Processes

    Authors: Daniel Votipka, Seth M. Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek

    Abstract: Reverse engineering is a complex process essential to software-security tasks such as vulnerability discovery and malware analysis. Significant research and engineering effort has gone into develo** tools to support reverse engineers. However, little work has been done to understand the way reverse engineers think when analyzing programs, leaving tool developers to make interface design decision… ▽ More

    Submitted 30 November, 2019; originally announced December 2019.

    Comments: 22 pages, 6 figures, to appear at the 2020 USENIX Security Symposium

  18. arXiv:1910.13554  [pdf, other

    cs.LO

    Differential Hoare Logics and Refinement Calculi for Hybrid Systems with Isabelle/HOL

    Authors: Simon Foster, Jonathan Julián Huerta y Munive, Georg Struth

    Abstract: We present simple new Hoare logics and refinement calculi for hybrid systems in the style of differential dynamic logic. (Refinement) Kleene algebra with tests is used for reasoning about the program structure and generating verification conditions at this level. Lenses capture hybrid program stores in a generic algebraic way. The approach has been formalised with the Isabelle/HOL proof assistant.… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

    Comments: 13 pages, no figures, conference

    ACM Class: F.3.1

  19. arXiv:1906.09621  [pdf, other

    cs.LG cs.AI stat.ML

    Making the Cut: A Bandit-based Approach to Tiered Interviewing

    Authors: Candice Schumann, Zhi Lang, Jeffrey S. Foster, John P. Dickerson

    Abstract: Given a huge set of applicants, how should a firm allocate sequential resume screenings, phone interviews, and in-person site visits? In a tiered interview process, later stages (e.g., in-person visits) are more informative, but also more expensive than earlier stages (e.g., resume screenings). Using accepted hiring models and the concept of structured interviews, a best practice in human resource… ▽ More

    Submitted 14 November, 2019; v1 submitted 23 June, 2019; originally announced June 2019.

  20. arXiv:1905.06192  [pdf, other

    cs.LO cs.SE

    Mechanised Assurance Cases with Integrated Formal Methods in Isabelle

    Authors: Yakoub Nemouchi, Simon Foster, Mario Gleirscher, Tim Kelly

    Abstract: Assurance cases are often required as a means to certify a critical system. Use of formal methods in assurance can improve automation, and overcome problems with ambiguity, faulty reasoning, and inadequate evidentiary support. However, assurance cases can rarely be fully formalised, as the use of formal methods is contingent on models validated by informal processes. Consequently, we need assuranc… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: 17 pages, submitted to FM 2019

  21. Unifying Semantic Foundations for Automated Verification Tools in Isabelle/UTP

    Authors: Simon Foster, James Baxter, Ana Cavalcanti, Jim Woodcock, Frank Zeyda

    Abstract: The growing complexity and diversity of models used in the engineering of dependable systems implies that a variety of formal methods, across differing abstractions, paradigms, and presentations, must be integrated. Such an integration relies on unified semantic foundations for the various notations, and co-ordination of a variety of automated verification tools. The contribution of this paper is… ▽ More

    Submitted 22 June, 2020; v1 submitted 14 May, 2019; originally announced May 2019.

    Comments: 40 pages, Accepted for Science of Computer Programming, June 2020

  22. arXiv:1905.03490  [pdf, other

    cs.SE

    Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models

    Authors: Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe

    Abstract: Matlab/Simulink is a development and simulation language that is widely used by the Cyber-Physical System (CPS) industry to model dynamical systems. There are two mainstream approaches to verify CPS Simulink models: model testing that attempts to identify failures in models by executing them for a number of sampled test inputs, and model checking that attempts to exhaustively check the correctness… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 10 pages + 2 page references

  23. arXiv:1904.08875  [pdf, other

    cond-mat.mtrl-sci cs.LG

    DScribe: Library of Descriptors for Machine Learning in Materials Science

    Authors: Lauri Himanen, Marc O. J. Jäger, Eiaki V. Morooka, Filippo Federici Canova, Yashasvi S. Ranawat, David Z. Gao, Patrick Rinke, Adam S. Foster

    Abstract: DScribe is a software package for machine learning that provides popular feature transformations ("descriptors") for atomistic materials simulations. DScribe accelerates the application of machine learning for atomistic property prediction by providing user-friendly, off-the-shelf descriptor implementations. The package currently contains implementations for Coulomb matrix, Ewald sum matrix, sine… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    Journal ref: Comp. Phys. Comm. 247 (2020) 106949

  24. arXiv:1904.03521  [pdf, other

    cs.PL

    Type-Level Computations for Ruby Libraries

    Authors: Milod Kazerounian, Sankha Narayan Guria, Niki Vazou, Jeffrey S. Foster, David Van Horn

    Abstract: Many researchers have explored ways to bring static ty** to dynamic languages. However, to date, such systems are not precise enough when types depend on values, which often arises when using certain Ruby libraries. For example, the type safety of a database query in Ruby on Rails depends on the table and column names used in the query. To address this issue, we introduce CompRDL, a type system… ▽ More

    Submitted 6 April, 2019; originally announced April 2019.

    Comments: 22 pages, this is a technical report (with appendix) of a paper to appear in Programming Language Design and Implementation (PLDI 2019)

  25. arXiv:1903.12247  [pdf, ps, other

    cs.SE

    iGen: Dynamic Interaction Inference for Configurable Software

    Authors: ThanhVu Nguyen, Ugur Koc, Javran Cheng, Jeffrey S. Foster, Adam A. Porter

    Abstract: To develop, analyze, and evolve today's highly configurable software systems, developers need deep knowledge of a system's configuration options, e.g., how options need to be set to reach certain locations, what configurations to use for testing, etc. Today, acquiring this detailed information requires manual effort that is difficult, expensive, and error prone. In this paper, we propose iGen, a n… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Journal ref: 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), pages 655--665. ACM, 2016

  26. arXiv:1812.10103  [pdf, ps, other

    cs.SE cs.CY cs.RO

    New Opportunities for Integrated Formal Methods

    Authors: Mario Gleirscher, Simon Foster, Jim Woodcock

    Abstract: Formal methods have provided approaches for investigating software engineering fundamentals and also have high potential to improve current practices in dependability assurance. In this article, we summarise known strengths and weaknesses of formal methods. From the perspective of the assurance of robots and autonomous systems (RAS), we highlight new opportunities for integrated formal methods and… ▽ More

    Submitted 4 November, 2019; v1 submitted 25 December, 2018; originally announced December 2018.

    Journal ref: ACM Comput. Surv. 52, 6 (October 2019), 35 pages

  27. Automating Verification of State Machines with Reactive Designs and Isabelle/UTP

    Authors: Simon Foster, James Baxter, Ana Cavalcanti, Alvaro Miyazawa, Jim Woodcock

    Abstract: State-machine based notations are ubiquitous in the description of component systems, particularly in the robotic domain. To ensure these systems are safe and predictable, formal verification techniques are important, and can be cost-effective if they are both automated and scalable. In this paper, we present a verification approach for a diagrammatic state machine language that utilises theorem p… ▽ More

    Submitted 24 August, 2018; v1 submitted 23 July, 2018; originally announced July 2018.

    Comments: 18 pages, 16th Intl. Conf. on Formal Aspects of Component Software (FACS 2018), October 2018, Pohang, South Korea

  28. arXiv:1806.02101  [pdf, ps, other

    cs.LO

    Calculational Verification of Reactive Programs with Reactive Relations and Kleene Algebra

    Authors: Simon Foster, Kangfeng Ye, Ana Cavalcanti, Jim Woodcock

    Abstract: Reactive programs are ubiquitous in modern applications, and so verification is highly desirable. We present a verification strategy for reactive programs with a large or infinite state space utilising algebraic laws for reactive relations. We define novel operators to characterise interactions and state updates, and an associated equational theory. With this we can calculate a reactive program's… ▽ More

    Submitted 7 August, 2018; v1 submitted 6 June, 2018; originally announced June 2018.

    Comments: 18 pages, accepted for RAMICS 2018

    Journal ref: RAMICS 2018, Oct 2018, Groningen, Netherlands

  29. Evaluating Design Tradeoffs in Numeric Static Analysis for Java

    Authors: Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks

    Abstract: Numeric static analysis for Java has a broad range of potentially useful applications, including array bounds checking and resource usage estimation. However, designing a scalable numeric static analysis for real-world Java programs presents a multitude of design choices, each of which may interact with others. For example, an analysis could handle method calls via either a top-down or bottom-up i… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

  30. Unifying Theories of Reactive Design Contracts

    Authors: Simon Foster, Ana Cavalcanti, Samuel Canham, Jim Woodcock, Frank Zeyda

    Abstract: Design-by-contract is an important technique for model-based design in which a composite system is specified by a collection of contracts that specify the behavioural assumptions and guarantees of each component. In this paper, we describe a unifying theory for reactive design contracts that provides the basis for modelling and verification of reactive systems. We provide a language for expression… ▽ More

    Submitted 9 September, 2019; v1 submitted 29 December, 2017; originally announced December 2017.

    Comments: 43 pages, accepted for publication in Theoretical Computer Science, September 2019

  31. Unifying Theories of Time with Generalised Reactive Processes

    Authors: Simon Foster, Ana Cavalcanti, Jim Woodcock, Frank Zeyda

    Abstract: Hoare and He's theory of reactive processes provides a unifying foundation for the formal semantics of concurrent and reactive languages. Though highly applicable, their theory is limited to models that can express event histories as discrete sequences. In this paper, we show how their theory can be generalised by using an abstract trace algebra. We show how the algebra, notably, allows us to also… ▽ More

    Submitted 21 February, 2018; v1 submitted 29 December, 2017; originally announced December 2017.

    Comments: 7 pages, accepted for Information Processing Letters, 15th February 2018

  32. arXiv:1711.09281  [pdf, ps, other

    cs.PL

    Refinement Types for Ruby

    Authors: Milod Kazerounian, Niki Vazou, Austin Bourgerie, Jeffrey S. Foster, Emina Torlak

    Abstract: Refinement types are a popular way to specify and reason about key program properties. In this paper, we introduce RTR, a new system that adds refinement types to Ruby. RTR is built on top of RDL, a Ruby type checker that provides basic type information for the verification process. RTR works by encoding its verification problems into Rosette, a solver-aided host language. RTR handles mixins throu… ▽ More

    Submitted 25 November, 2017; originally announced November 2017.

  33. arXiv:1709.03441  [pdf, ps, other

    cs.LG

    The Diverse Cohort Selection Problem

    Authors: Candice Schumann, Samsara N. Counts, Jeffrey S. Foster, John P. Dickerson

    Abstract: How should a firm allocate its limited interviewing resources to select the optimal cohort of new employees from a large set of job applicants? How should that firm allocate cheap but noisy resume screenings and expensive but in-depth in-person interviews? We view this problem through the lens of combinatorial pure exploration (CPE) in the multi-armed bandit setting, where a central learning agent… ▽ More

    Submitted 14 March, 2019; v1 submitted 11 September, 2017; originally announced September 2017.

  34. arXiv:1604.03641  [pdf, ps, other

    cs.PL

    Just-in-Time Static Type Checking for Dynamic Languages

    Authors: Brianna M. Ren, Jeffrey S. Foster

    Abstract: Dynamic languages such as Ruby, Python, and JavaScript have many compelling benefits, but the lack of static types means subtle errors can remain latent in code for a long time. While many researchers have developed various systems to bring some of the benefits of static types to dynamic languages, prior approaches have trouble dealing with metaprogramming, which generates code as the program exec… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: 19 pages, 6 figures, 2 tables, 1 appendix, This is a preprint of a paper to appear in Programming Language Design and Implementation (PLDI 2016)

    ACM Class: F.3.2

  35. arXiv:1507.03577  [pdf, other

    cs.PL

    JSKETCH: Sketching for Java

    Authors: **seong Jeon, Xiaokang Qiu, Jeffrey S. Foster, Armando Solar-Lezama

    Abstract: Sketch-based synthesis, epitomized by the SKETCH tool, lets developers synthesize software starting from a partial program, also called a sketch or template. This paper presents JSKETCH, a tool that brings sketch-based synthesis to Java. JSKETCH's input is a partial Java program that may include holes, which are unknown constants, expression generators, which range over sets of expressions, and cl… ▽ More

    Submitted 13 July, 2015; originally announced July 2015.

    Comments: This research was supported in part by NSF CCF-1139021, CCF- 1139056, CCF-1161775, and the partnership between UMIACS and the Laboratory for Telecommunication Sciences

    ACM Class: I.2.2; F.3.1

  36. arXiv:1504.03711  [pdf, other

    cs.CR

    Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution

    Authors: Kristopher Micinski, Jonathan Fetter-Degges, **seong Jeon, Jeffrey S. Foster, Michael R. Clarkson

    Abstract: Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data. In this paper, we introduce interaction-based declassification policies, in which the user's interactions with the app constrain the release of sensitive information. Our policies are defined extensionally,… ▽ More

    Submitted 29 July, 2015; v1 submitted 14 April, 2015; originally announced April 2015.

    Comments: This research was supported in part by NSF grants CNS-1064997 and 1421373, AFOSR grants FA9550-12-1-0334 and FA9550-14-1-0334, a partnership between UMIACS and the Laboratory for Telecommunication Sciences, and the National Security Agency

  37. Incremental Computation with Names

    Authors: Matthew A. Hammer, Jana Dunfield, Kyle Headley, Nicholas Labich, Jeffrey S. Foster, Michael Hicks, David Van Horn

    Abstract: Over the past thirty years, there has been significant progress in develo** general-purpose, language-based approaches to incremental computation, which aims to efficiently update the result of a computation when an input is changed. A key design challenge in such approaches is how to provide efficient incremental support for a broad range of programs. In this paper, we argue that first-class na… ▽ More

    Submitted 23 March, 2021; v1 submitted 26 March, 2015; originally announced March 2015.

    Comments: OOPSLA '15, October 25-30, 2015, Pittsburgh, PA, USA

    ACM Class: D.3.1; D.3.3; F.3.2

  38. arXiv:1404.7792  [pdf, other

    cs.SE

    Towards Verification of Constituent Systems through Automated Proof

    Authors: Luis Diogo Couto, Simon Foster, Richard Payne

    Abstract: This paper explores verification of constituent systems within the context of the Symphony tool platform for Systems of Systems (SoS). Our SoS modelling language, CML, supports various contractual specification elements, such as state invariants and operation preconditions, which can be used to specify contractual obligations on the constituent systems of a SoS. To support verification of these ob… ▽ More

    Submitted 7 May, 2014; v1 submitted 30 April, 2014; originally announced April 2014.

    Comments: EDCC-2014, EDSoS-2014

  39. arXiv:1112.3833  [pdf, ps, other

    cs.PL

    Dependently Typed Programming based on Automated Theorem Proving

    Authors: Alasdair Armstrong, Simon Foster, Georg Struth

    Abstract: Mella is a minimalistic dependently typed programming language and interactive theorem prover implemented in Haskell. Its main purpose is to investigate the effective integration of automated theorem provers in a pure and simple setting. Such integrations are essential for supporting program development in dependently typed languages. We integrate the equational theorem prover Waldmeister and test… ▽ More

    Submitted 16 December, 2011; originally announced December 2011.

    ACM Class: D.1.1; F.3.1; F.4.1